Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-03 14:00:00 UTC
ThreatPost
ThreatPost
Supply Chain Account Takeover: How Criminals Exploit Third-Party Access

It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.

Breach Cloud Security IoT Malware Vulnerabilities Web Security Data Theft Malware Distribution Supply Chain Account Takeover Third-Party Relationships
2019-12-03 13:26:00 UTC
ThreatPost
ThreatPost
‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly.

Malware Mobile Security Vulnerabilities Android Exploit Google Play Hackers Malware Mobile Apps Mobile Security StrandHogg Trojan Vulnerability
2019-12-03 13:18:00 UTC
HackRead
HackRead
Step-by-Step Guide to Creating the Best Web Pages

By Uzair Amir

Everyone knows that your site design and content can be the difference between success and failure...

This is a post from HackRead.com Read the original post: Step-by-Step Guide to Creating the Best Web Pages

How To
2019-12-03 11:55:00 UTC
Naked Security | Sophos
Naked Security | Sophos
SMS company exposes millions of text messages, credentials online

Researchers at VpnMentor claim that the TrueDialog data leak exposure could have compromised tens of millions of people.

Data Loss Privacy Security Threats Data Data Breach Data Leak Data Loss Elasticsearch Exposed Database SMS TrueDialog
2019-12-03 11:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Mixcloud user accounts up for sale on dark web

A hacker is ransoming account data stolen from music streaming service Mixcloud, according to reports.

Data Loss Privacy Security Threats Data Breach Data Loss Hashing Mixcloud Ransom
2019-12-03 11:39:00 UTC
Naked Security | Sophos
Naked Security | Sophos
IM RAT spy tool seller raided, busted, kicked offline

The spyware gave complete control of victimized computers, sold for as little as$25, and was bought by 14,500 hackers worldwide.

Law & Order Malware Security Threats Cyberstalking Imminent Methods Imminent Monitor Remote Access Trojan NCA RAT Remote-access Trojan Spy Tool Spying Spying App Spyware Trojan
2019-12-03 11:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ad fraud: Fake local news sites are rolling in the dough

"forbesbusinessinsider.com?" Names like that sound close enough to real news domains to pass, but bots are the only ones visiting.

Amazon Fake News Google Ad Fraud Ads Bots Click Fraud Fake News Google Ad Network Google Ads Seo
2019-12-03 10:39:00 UTC
The Daily Swig
The Daily Swig
Ransomware slingers ramp up attacks on back-up devices

NAS under assault

2019-12-02 21:00:00 UTC
ThreatPost
ThreatPost
Microsoft OAuth Flaw Opens Azure Accounts to Takeover

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover.

Cloud Security Vulnerabilities Web Security Azure Identity Management Microsoft Microsoft Azure Microsoft Login Oauth Oauth Authentication
2019-12-02 19:13:00 UTC
ThreatPost
ThreatPost
Authorities Break Up Imminent Monitor Spyware Organization

The infrastructure behind a remote access tool (RAT) allowing full remote takeover of a victim machine has been dismantled.

Government Malware Arrests Australia Imminent Monitor Law Enforcement RAT Remote Access Tool Remote Takeover Shockwave Spyware Takedown Unit 42

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Point of View

OUR TAKE ON TRENDING STORIES
April 2024
By SUE DENIM
Cyber Warfare: Breaches, Alerts, and Cybersecurity Policy
In cyber warfare, it seems no sector is safe from the relentless clutches of threat actors. Take, for instance, a Russian food manufacturing giant finding itself in the crosshairs of a Ukrainian hacker collective. With a flair for the dramatic, the group proudly proclaimed their conquest in a channel dedicated to airing their digital conquests. Their loot? A whopping 6TB of sensitive data, includi...

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
27 May 2024
BREACHAWARE HQ

A total of 24 breaches were found and analysed resulting in 4,340,106 leaked accounts containing a total of 23 different data types. The breaches found publicly and freely available included Kringle Cash, Stealer Log 0462, Games Nord, Money Man and NOSIS